


Perceptive Security
SOC/SIEM Consultancy

Flowise is a drag & drop user interface to build a customized large language model flow. Prior to 3.0.13, Flowise exposes an HTTP Node in AgentFlow and Chatflow…
Published:
9 maart 2026 om 23:00:00
Alert date:
10 maart 2026 om 23:02:27
Source:
nvd.nist.gov
Web Technologies, Emerging Technologies
Flowise, a drag & drop UI for building customized large language model flows, contains a Server-Side Request Forgery (SSRF) vulnerability in versions prior to 3.0.13. The vulnerability exists in the HTTP Node component of AgentFlow and Chatflow features, which performs server-side HTTP requests using user-controlled URLs without proper validation. Attackers can exploit this to force the Flowise server to make requests to internal network resources including private IP ranges (RFC 1918), localhost, and cloud metadata endpoints. This allows unauthorized access to internal systems that are not accessible from the public internet. The vulnerability has been patched in version 3.0.13.
Technical details
Mitigation steps:
Affected products:
Flowise
Related links:
https://nvd.nist.gov/vuln/detail/CVE-2026-31829
https://github.com/FlowiseAI/Flowise/security/advisories/GHSA-fvcw-9w9r-pxc7
Related CVE's:
Related threat actors:
IOC's:
This article was created with the assistance of AI technology by Perceptive.
